Top 5 Ways to Identify and Address Insider Threats

| | General Security
A recent report commissioned by CA Technologies threw up some very interesting and alarming data about the threats that an insider can pose to an organization. The report found that: 90% of... Go on to the site to read the full article ... Read More

Bug Bounty Programs: The Low-Down

| | General Security
The global software industry is massive. Enterprise software alone is predicted to be worth $500 billion a year by 2022. Unless we live entirely off-grid, every part of our lives and work is touched... Go on to the site to read the full article ... Read More

Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi Nightmare?

| | General Security
In an episode of “The Twilight Zone” called “Living Doll,” a lifelike doll named Talky Tina turned rogue and terrorized a family. This nightmare scenario of out-of-control toys is sometimes portrayed... Go on to the site to read the full article ... Read More

Top 5 Best Practices for Third-Party Security

| | Security Awareness
Introduction With the digital transformation of our communication systems and the development of cloud and edge computing, the enterprise perimeter is fuzzier than ever. This has helped to open up... Go on to the site to read the full article ... Read More

Top 30 Chief Security Officer (CSO) Interview Questions and Answers for 2018

| | Hacking
The role of the Chief Security Officer (CSO) is highly sought-after in the world of cybersecurity. When you become a CSO, you take on a wide-scope role, covering everything that touches your security... Go on to the site to read the full article ... Read More

W-2 Phishing Scams: Will They Affect You and How Can You Protect Yourself?

| | Security Awareness
W-2 forms are an essential part of our working lives in the U.S. At the end of each year, a company will provide employees and the IRS with their W-2 form. The employee then uses this form to fill in... Go on to the site to read the full article ... Read More

Taking an Identity Selfie – Self-Sovereign Identity and the Blockchain

| | General Security
In the early 2000s, there was a lot of work around defining what digital identity was and how it could be used in a connected digital world. In 2005, Kim Cameron of Microsoft came up with a set of... Go on to the site to read the full article ... Read More

What Your Data Protection Officer Should Know About Privacy Requirements

| | Security Awareness
Data privacy suddenly got hot a few years ago when Edward Snowden made his revelations about the NSA snooping on U.S. citizens’ data. Since then, data privacy violations and misuse have become... Go on to the site to read the full article ... Read More

What Should a Security Manager Know About US and UK Privacy Laws?

| | Security Awareness
George Bernard Shaw once said that the U.K. and U.S. were “two nations divided by a common language.” You can say a similar thing about security managers. Security managers in both countries have... Go on to the site to read the full article ... Read More

How a Data Protection Officer Will Benefit Your Organization

| | Security Awareness
In May of 2018, the European Union’s General Data Protection Regulation (GDPR) came into force. This wide-reaching law touches any company, no matter what size or type, as long as they process the... Go on to the site to read the full article ... Read More
Loading...